Product Security Assessment (IEC 62443-2)

Minimize risks, find open entry points.

Do you have a networked product and are wondering whether you can still sell it after the introduction of the Cyber Resilience Act or which things should be changed in the next update?

The Solution?

A Product Security Audit by an Expert!

In many cases, our customers are not sure where their products stand in terms of security. It is obvious that security is important, but it is unclear how much they should invest, where they should start or how they should proceed. To avoid overinvestment, a basis for decision-making is required, which often cannot be created internally because the customer's core business is far removed from cyber security.

Our answer is: two security experts, two weeks and a product security audit report as a result. Our experts will determine whether measures are needed to improve the security of your products and make recommendations on what these measures should look like.

As the status of security processes and documentation in companies can vary greatly, we draw on the entire Teleconnect security portfolio and adaptively apply the methods that are best suited to the scenario in question. For example, if security concepts already exist, our security engineers can review them. If no documentation is available, our security engineers can interview the developers and architects to determine if measures are required. If no one is available to answer questions, our engineers can even apply penetration testing techniques. There is a customized solution for every client - based on their fixed budget.

 

Know what you are getting into?

Security is an important topic in product development, but questions about design and implementation often remain unanswered:
  • How safe are your products? What is an appropriate level of security?
  • Have you invested enough and in the right places to guarantee the security of your products?
  • Where do you start with existing products? An audit provides a good basis for decision-making.
At a glance:
  • Fixed time frame and price - workshop format possible if necessary
  • Flexible design through suitable selection of experts (gap analysis, processes, product, development artifacts, etc.)
  • Conducting a product security audit according to the IEC 62443-6-1 methodology

Invite us to a free initial consultation!

Security in all industries

As developers in the telecommunications and industrial communications sector for over thirty years, our colleagues at Teleconnect understand cyber security and know the technologies and processes of your industry. And we combine all this to your advantage.

We are on the ball for you and can tell you whether your product is technically secure based on our industry knowledge in many product categories. Put us to the test!

Bild3

How we create your security product audit report

1
Collect
Security concepts are compiled and applicable security requirements are reviewed.
2
Perform
Audit of the artifacts, if necessary, execution of penetration tests.
4
Analyze
Security gaps are recorded and causes identified.
3
Report
The results are discussed and the effects evaluated.
5
Initiate measures
Together we check the final status and the necessary measures.

Working in partnership
Cross-industry knowledge
Audits by practitioners

You want to lower risks in your project significantly?

Our experts look forward to hearing from you